-
Notifications
You must be signed in to change notification settings - Fork 565
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleaner ignores hostnames in SSL certificates #3919
Comments
Not sure if this could fit:
This implies |
That sounds good to me, or at least I dont have a better idea. I think a good place for this would be around Line 692 in 142ddb4
@TurboTurtle , does the idea from Pablo sound good to you? |
I think it's a reasonable approach for when users definitely want that content, however I hesitate to make it a default because there are certainly environments/organizations out there that would not want any part of their certs discernable (whether or not that's a valid posture to take is tangental to what we're talking about here). I like an approach where we have these options:
I'm not sure off the top of my head what the default should be though. |
I would vote for
as the default. That means the data are not further usable for SSL purposes, while it still provides valuable information like expiration, key length, signature algorithm etc. This option (regardless if default or not) should be also treated in a way if @pafernanr , would you like to try implement this? If not, I can, for sure ;-) |
@pmoravec I was thinking about how to implement it, IMO get the target-certfile-list is not easy. Search for file extensions is not accurate and requires extra resources. The best way I can think of is to let every plugin to define a few List-variables. E.g:
There should be a post-report-execution action to transform/remove such certificate files. If I'm not wrong this also aligns to @TurboTurtle's requirements. |
User story: Cleaner was applied to a sosreport. Since the sosreport was taken from a RedHat distro,
/etc/pki/consumer/cert.pem
was collected bydnf
plugin. The certificate file contains plain FQDNs. Example from my system (some.domain
was manually obfuscated by myself):The file is not binary, so cleaner does not remove it. But the hostnames are straighforwardly "encoded" within the file.
Can be there some solution, at all? I ruled out a few ideas already..
Imho the best we can do is cleaner raising a warning "hey, I leave untouched a certificate that may contain sensitive info".
The text was updated successfully, but these errors were encountered: